Tag: corporate
-
Victoria’s Secret delays earnings release after security incident
Fashion retail giant Victoria’s Secret has delayed its first quarter 2025 earnings release because of ongoing corporate system restoration efforts following a May 24 security incident. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/victorias-secret-delays-earnings-release-after-security-incident/
-
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion
Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping.”By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence,” Vasu Jakkal, corporate vice…
-
North Korea’s Laptop Farm Scam: ‘Something We’d Never Seen Before’
Officials uncover how North Korean operatives used stolen identities and remote-controlled tech to infiltrate American companies and steal corporate data. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-north-korea-laptop-farm-remote-job-scam/
-
Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks
In a two UK-based universities have fallen victim to a sophisticated Remote Access Trojan (RAT) dubbed NodeSnake within the past two months. According to analysis by Quorum Cyber’s Threat Intelligence (QCTI) team Report, this malware, likely deployed by the ransomware group Interlock, showcases advanced capabilities for persistent access and network infiltration. Emerging Threat Targets Higher…
-
CFOs, financial execs in crosshairs of ‘highly targeted’ spearphishing campaign
Hackers are preying on senior corporate leaders at banks, investment firms, utilities and insurance companies worldwide. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/spearphishing-remote-access-campaign-cfos-finance-executives-trellix/749192/
-
Interlock ransomware gang deploys new NodeSnake RAT on universities
The Interlock ransomware gang is deploying a previously undocumented remote access trojan (RAT) named NodeSnake against educational institutes for persistent access to corporate networks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/
-
If you use OneDrive to upload files to ChatGPT or Zoom, don’t
Tags: access, api, chatgpt, compliance, corporate, cybersecurity, data, google, governance, least-privilege, microsoft, mitigation, risk, saas, security-incident, service, strategy, threat, toolWeb app vendors aren’t off the hook: This could be bad news for security teams, according to Eric Schwake, director of cybersecurity strategy at Salt Security. “Sensitive secrets required for this access are often stored in an insecure manner by default,” Schwake said. “This situation presents a key API security challenge for security teams, and…
-
‘Secure email’: A losing battle CISOs must give up
End-to-end encryption remains elusive: Email continues to be the dominant electronic communication tool today because it is well understood, relatively easy to use, and relatively inexpensive. By and large, businesses have approved email for sending confidential information, and we often convince ourselves that it is secure, can be secured with third-party tools, or it’s “good…
-
Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data
DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95% of Fortune 500 companies, and boasts a user base exceeding one billion. However, this widespread adoption has made DocuSign a prime target for cybercriminals. Leveraging the platform’s trusted reputation, threat actors are increasingly deploying sophisticated phishing campaigns to harvest corporate credentials,…
-
AI Agents and the Non”‘Human Identity Crisis: How to Deploy AI”¯More Securely”¯at”¯Scale
Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub”¯Copilot’s code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate to other services, quietly swelling the population of non”‘human identities (NHIs) across corporate clouds.That population is already overwhelming the enterprise: many companies First seen on thehackernews.com…
-
Experts Chart Path to Creating Safer Online Spaces for Women
Gaps in laws, technology, and corporate accountability continue to put women’s safety and privacy online at risk. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/experts-path-creating-safer-online-spaces
-
3AM ransomware uses spoofed IT calls, email bombing to breach networks
A 3AM ransomware affiliate is conducting highly targeted attacks using email bombing and spoofed IT support calls to socially engineer employees into giving credentials for remote access to corporate systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/
-
Coinbase data breach impacted 69,461 individuals
Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals. Coinbase disclosed that a data breach impacted 69,461 individuals after overseas support staff improperly accessed customer and corporate data. Coinbase recently revealed that rogue contractors stole data on under 1% of users and demanded $20M; the data breach was initially…
-
Coinbase says recent data breach impacts 69,461 customers
Coinbase, a cryptocurrency exchange with over 100 million customers, revealed that a recent data breach in which cybercriminals stole customer and corporate data affected 69,461 individuals First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/coinbase-says-recent-data-breach-impacts-69-461-customers/
-
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including Amazon S3 buckets and Microsoft Azure endpoints, by leveraging misconfigurations in the Domain Name System (DNS) records.The hijacked domains are then used to host URLs that direct users to scams and malware via traffic distribution systems (TDSes),…
-
4 ways to safeguard CISO communications from legal liabilities
Tags: ciso, communications, corporate, cyber, data, defense, governance, government, incident, jobs, law, privacy, regulation, risk, vulnerabilityPay attention to the medium: CISOs also need to pay attention to what they say based on the medium in which they are communicating. Pay attention to “how we communicate, who we’re communicating with, what platforms we’re communicating on, and whether it’s oral or written,” Angela Mauceri, corporate director and assistant general counsel for cyber…
-
CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
A phishing operation that targets corporate banking accounts across the globe has been analyzed in a new report by CTM360. The campaign uses fake Google ads, advanced … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/19/ctm360-cyberheist-phish-report/
-
Google strengthens secure enterprise access from BYOD Android devices
Google has introduced Device Trust from Android Enterprise, a new solution for making sure that private Android devices used for work are secure enough to access corporate … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/14/device-trust-from-android-enterprise-secure-access/
-
4 critical leadership priorities for CISOs in the AI era
1. Guide the C-suite As businesses rush to implement AI effectively, CISOs can play an important role in guiding the C-suite on a variety of matters, starting with vetting AI use cases, Alexander says. “These are conversations with technologists, security, and the business. You can’t just jump into the AI game without really understanding what…
-
Microsoft Listens to Security Concerns and Delays New OneDrive Sync
Tags: corporate, cybersecurity, data, malware, microsoft, privacy, risk, service, software, vulnerabilityMisuse of the newly announced Microsoft OneDrive synchronization feature puts corporate security and personal privacy at serious risk in ways not likely understood by the users. Microsoft wants people to connect their personal OneDrive file share with their work systems, synchronizing potentially private files onto their enterprise managed PCs. The problem is having these files…
-
Microsoft OneDrive move may facilitate accidental sensitive file exfiltration
want to make syncing easier, as it can create lots of security and IT headaches.The rollout was originally scheduled for this weekend (May 11), but sometime late on Thursday, the Microsoft page about the feature was changed to say that it was being pushed out in June. Microsoft did not immediately explain the delay, but discussions…
-
Education giant Pearson hit by cyberattack exposing customer data
Education giant Pearson suffered a cyberattack, allowing threat actors to steal corporate data and customer information, BleepingComputer has learned. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/
-
Rethinking Executive Security in the Age of Human Risk
Nisos Rethinking Executive Security in the Age of Human Risk Employment fraud is no longer just an HR issue – it’s an enterprise-wide risk that threatens financial stability, regulatory compliance, and corporate reputation… First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/rethinking-executive-security-in-the-age-of-human-risk/
-
AWS Study: Generative AI Tops Corporate Budget Priorities, Surpassing Cybersecurity
A new AWS study finds generative AI has become the top budget priority for 2025, surpassing cybersecurity, as businesses accelerate adoption and face talent gaps. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/ai-surpasses-cybersecurity-aws-study/
-
Personal data of top executives easily found online
The personal information of 75% of corporate directors can be found on people search sites, according to Incogni. People search sites claim to reveal a variety of personal … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/05/07/corporate-directors-personal-information-online/
-
App Used by Trump Adviser Suspends Services After Hack Taking ’15-20 Minutes’
TeleMessage, a messaging app used by Trump adviser Mike Waltz, has suspended services after a hacker accessed sensitive government and corporate data. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-telemessage-hack/
-
Critical Microsoft 0-Click Telnet Vulnerability Enables Credential Theft Without User Action
A critical vulnerability has been uncovered in Microsoft’s Telnet Client (telnet.exe), enabling attackers to steal Windows credentials from unsuspecting users, even without interaction in certain network scenarios. Security researchers warn that this >>zero-click

